Feeds

eBay pulls Vista laptop pwned in hacking contest

Do no harm

Next gen security for virtualised datacentres

An eBay listing for the Windows Vista laptop that was successfully compromised at last week's Pwn2Own hacking contest was removed after the online auctioneer said it violated terms that forbid sales of items that might do harm.

Shane Macaulay, who felled the machine with code that attacked a weakness in Adobe Flash, posted the listing late Monday night, California time. Within two hours, he said in an interview, he received an automated email that said the auction had been suspended.

According to this article by IDG News, the listing read: "This laptop is a good case study for any forensics group/company/individual that wants to prove how cool they are, and a live example, not canned of what a typical incident response sitchiation [sic] would look like."

"At least on the eBay item, I was being a little sensationalistic, but I was just trying to get a sale," he told El Reg. He said he didn't mean to break contest rules that forbid the disclosure of the flaw or exploit code prior to there being a patch.

"By the time they would have gotten it (the laptop), I'm positively sure it would be patched," he said. "The reason i didn't say that outright (was) i wanted to ... see what the market would pay for" the unpatched vulnerability.

Macaulay was one of two attendees to take a prize during last week's contest at the CanSecWest conference in Vancouver. Charlie Miller and two two other researchers from Independent Security Evaluators, won $10,000 for a previously unknown Safari browser exploit that brought down a fully patched MacBook Pro. Macaulay, who was aided by researcher Alex Sotirov, won $5,000 for their exploit. Winners were also permitted to keep the machines. A third laptop running Ubuntu remained standing.

The cash prize is paid by 3Com's Tipping Point division, whose Zero Day Initiative pays bounties to researchers who responsibly disclose vulnerabilities. One condition imposed on sellers is that they provide no details of the vulnerability.

A spokeswoman for eBay told IDG the wording of Macaulay's listing led them to think the laptop could do someone harm. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Best practices for enterprise data
Discussing how technology providers have innovated in order to solve new challenges, creating a new framework for enterprise data.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?